Partial key recovery attack against RMAC

Chris J. Mitchell and Knudsen, L. R.

(2005)

Chris J. Mitchell and Knudsen, L. R. (2005) Partial key recovery attack against RMAC. Journal of Cryptology, 18 (4).

Our Full Text Deposits

Full text access: Open

Full Text - 198.63 KB

Links to Copies of this Item Held Elsewhere


Abstract

In this paper new “partial” key recovery attacks against the RMAC block cipher based Message Authentication Code scheme are described. That is we describe attacks that, in some cases, recover one of the two RMAC keys much more efficiently than previously described attacks. Although all attacks, but one, are of no major threat in practice, in some cases there is reason for concern. In particular, the recovery of the second RMAC key (of k bits) may only require around 2k/2 block cipher operations (encryptions or decryptions). The RMAC implementation using triple DES proposed by NIST is shown to be very weak.

Information about this Version

This is a Published version
This version's date is: 02/2005
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/a8611a34-e2c9-da3a-fc87-5d9e6a4a38f8/1/

Item TypeJournal Article
TitlePartial key recovery attack against RMAC
AuthorsMitchell, Chris
Knudsen, L. R.
Uncontrolled KeywordsMessage Authentication Codes, RMAC, AES, Triple DES, encryption, block cipher, key recovery attacks
DepartmentsFaculty of Science\Mathematics

Identifiers

doi10.1007/s00145-004-0324-7

Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 21-May-2010

Notes

The original publication is available at www.springerlink.com
Copyright 2005 Springer Verlag.


Details